Analysis
-
max time kernel
132s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 06:03
Static task
static1
Behavioral task
behavioral1
Sample
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe
-
Size
516KB
-
MD5
0021da726a32f0d55f2a81958da26ad4
-
SHA1
28acebd920aecd34689f18b261b407237886ba03
-
SHA256
d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650
-
SHA512
fa6a07c2b093d71a16aea4ffdc4caeca79bb64bd7136f814b682d57152859f4b8004693e3755b58e080d4d2ae3326555f67d03e5803964f5e07e0093c79d15fd
Malware Config
Signatures
-
Taurus Stealer Payload 7 IoCs
resource yara_rule behavioral1/memory/1300-61-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-63-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-64-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-66-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-67-0x000000000041CC20-mapping.dmp family_taurus_stealer behavioral1/memory/1300-69-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer behavioral1/memory/1300-71-0x0000000000400000-0x0000000000437000-memory.dmp family_taurus_stealer -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 -
Delays execution with timeout.exe 1 IoCs
pid Process 1416 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1760 wrote to memory of 1300 1760 d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe 28 PID 1300 wrote to memory of 872 1300 InstallUtil.exe 31 PID 1300 wrote to memory of 872 1300 InstallUtil.exe 31 PID 1300 wrote to memory of 872 1300 InstallUtil.exe 31 PID 1300 wrote to memory of 872 1300 InstallUtil.exe 31 PID 872 wrote to memory of 1416 872 cmd.exe 33 PID 872 wrote to memory of 1416 872 cmd.exe 33 PID 872 wrote to memory of 1416 872 cmd.exe 33 PID 872 wrote to memory of 1416 872 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe"C:\Users\Admin\AppData\Local\Temp\d1d13d5e097991e4aa47d7ca7f27e8ab86d868a2d07c89794e34fed6b9155650.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\timeout.exetimeout /t 34⤵
- Delays execution with timeout.exe
PID:1416
-
-
-